Phishing: Difference between revisions

Line 13: Line 13:
* The possibility of introducing a virus attack
* The possibility of introducing a virus attack
* The development of a legitimate website copy
* The development of a legitimate website copy
* Session Hijacking
* Via instant messaging
* Via instant messaging
* Fooling Internet users to submit financial and personal data or passwords
* Fooling Internet users to submit financial and personal data or passwords
* Emails that claim to be sent on behalf of well-known organizations  
* Emails that claim to be sent on behalf of well-known organizations  
* Data Theft
* DNS-Based Phishing also referred to as "Pharming" <ref>[http://pcworld.about.com/od/emailsecurity/Types-of-Phishing-Attacks.htm Phishing types]</ref>
* Voice phishing, which is a rather new form of phishing: users will receive an email allegedly from their favorite websites and will be requested to call a fraudulent number and update their information, which will then be stolen by the hacker.<ref>[http://www.spamlaws.com/voice-and-spear-phishing.html Voice phishing]</ref>
* Voice phishing, which is a rather new form of phishing: users will receive an email allegedly from their favorite websites and will be requested to call a fraudulent number and update their information, which will then be stolen by the hacker.<ref>[http://www.spamlaws.com/voice-and-spear-phishing.html Voice phishing]</ref>
* Tabnabbing, which takes advantage of multiple tabs which Internet users may frequently use and redirects the Internet user to the wrong website.
* Tabnabbing, which takes advantage of multiple tabs which Internet users may frequently use and redirects the Internet user to the wrong website. <ref>[http://www.crustiz.com/web-2-0/tabnagging-new-phishing-attack/ Tabnagging]</ref>
* Pop-up windows which may appear from legitimate and original websites but request financial and credential information.  
* Pop-up windows which may appear from legitimate and original websites but request financial and credential information.


==Protection against phishing practices==
==Protection against phishing practices==